Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Access"
DOI: 10.1109/access.2017.2671878
Abstract: This paper considers secure transmission with the aid of a helper for finite alphabet signals in multiple-input–multiple-output multiple antenna eavesdropper networks, where the helper transmits a jamming signal along with the confidential message sent by…
read more here.
Keywords:
secure transmission;
helper;
ergodic secrecy;
secrecy rate ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2859447
Abstract: Magnetic secure transmission (MST) is a technology that emulates the action of swiping a magstripe card in a card reader in that it artificially generates the magnetic signal produced when a card is swiped. MST…
read more here.
Keywords:
magnetic secure;
mobile payment;
payment;
secure transmission ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3159679
Abstract: Recently, the demand for spectral and energy efficiency has significantly been increased along with new breakthroughs in programmable meta-material techniques. The integration of an intelligent reflecting surface (IRS) into simultaneous wireless information and power transfer…
read more here.
Keywords:
reflecting surface;
swipt;
intelligent reflecting;
secure transmission ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2021.3110974
Abstract: In this paper, with the aim to enhance the secure transmission and improve the utilization of spectrum resources in IoT, a multicarrier non-orthogonal multiple access (MC-NOMA) assisted full duplex (FD) network is investigated, in which…
read more here.
Keywords:
resource allocation;
assisted full;
noma assisted;
secure transmission ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Journal on Selected Areas in Communications"
DOI: 10.1109/jsac.2018.2825541
Abstract: This paper focuses on the secure transmission of wireless-powered relay systems with the imperfect eavesdropper channel state information. For efficient energy transfer and information relaying, a novel two-phase protocol is proposed, in which the relay…
read more here.
Keywords:
information;
transmission;
secure transmission;
energy recycling ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2017.2730184
Abstract: An adaptive cooperative scheme is proposed to improve the security of a wireless-powered relay network. A source node sends data to a destination node in the presence of an amplify-and-forward untrusted relay node and an…
read more here.
Keywords:
relay;
source;
adaptive secure;
secure transmission ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2018.2886025
Abstract: This letter investigates secure transmission with imperfect channel state information (CSI) in multi-input single-output downlink wireless networks that consist of a transmitter, a desired receiver, one eavesdropper, and an assisting jammer. Specifically, only rough first-…
read more here.
Keywords:
secure transmission;
downlink;
assisting jammer;
distributionally robust ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2022.3182001
Abstract: In this letter, we present a novel deep reinforcement learning-assisted anti-jamming transmission scheme (DeepAntiJam) to guarantee reliable and creditable transmission in the presence of one smart jammer and multiple eavesdroppers. Specifically, we formulate secure transmission…
read more here.
Keywords:
reinforcement learning;
deep reinforcement;
transmission;
secure transmission ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Communications Letters"
DOI: 10.1109/lcomm.2022.3202647
Abstract: In this letter, a robust multi-component secure transmission scheme based on general multi-fractional Fourier transform (GMFRFT) with imperfect channel state information (CSI) is proposed and analyzed. The scheme combines signal and spatial domains for transmitted…
read more here.
Keywords:
gmfrft imperfect;
secure transmission;
imperfect csi;
scheme ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2020 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2020.2986404
Abstract: This letter examines the physical layer security of a cellular network with inband underlay relay-aided Device-to-Device (D2D) communication, considering the scenario where the channel state information is outdated. The relay node, which operates in a…
read more here.
Keywords:
relay aided;
relay;
transmission wiretap;
secure transmission ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Wireless Communications Letters"
DOI: 10.1109/lwc.2021.3136897
Abstract: In this letter, a reconfigurable intelligent surface (RIS) is employed to enhance the secure performance of non-orthogonal unicast-multicast (NOUM) transmissions, where the propagation environment can be manipulated to achieve communication security while maintaining the quality…
read more here.
Keywords:
intelligent surface;
unicast multicast;
non orthogonal;
reconfigurable intelligent ... See more keywords